[squid-dev] SSL-BUMP distinguish between mobile devices such as IOS or ANDROID vs PC request
Eliezer Croitoru
eliezer at ngtech.co.il
Thu Feb 22 18:56:44 UTC 2018
I was wondering about the options to distinguish mobile devices TLS\SSL
requests compared to PC one's.
When I am running the next test:
https://www.ssllabs.com/ssltest/analyze.html?d=www.squid%2dcache.org&s=77.93
.254.178&latest
I am receiving a list of details about the compatibility of specific
handshaking as listed:
Handshake Simulation
Android 2.3.7 No SNI 2 RSA 2048 (SHA256) TLS 1.0
TLS_DHE_RSA_WITH_AES_128_CBC_SHA DH 1024 FS
Android 4.0.4 RSA 2048 (SHA256) TLS 1.0
TLS_DHE_RSA_WITH_AES_256_CBC_SHA DH 1024 FS
Android 4.1.1 RSA 2048 (SHA256) TLS 1.0
TLS_DHE_RSA_WITH_AES_256_CBC_SHA DH 1024 FS
Android 4.2.2 RSA 2048 (SHA256) TLS 1.0
TLS_DHE_RSA_WITH_AES_256_CBC_SHA DH 1024 FS
Android 4.3 RSA 2048 (SHA256) TLS 1.0
TLS_DHE_RSA_WITH_AES_256_CBC_SHA DH 1024 FS
Android 4.4.2 RSA 2048 (SHA256) TLS 1.2
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DH 1024 FS
Android 5.0.0 RSA 2048 (SHA256) TLS 1.2
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 DH 1024 FS
Android 6.0 RSA 2048 (SHA256) TLS 1.2
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 DH 1024 FS
Android 7.0 RSA 2048 (SHA256) TLS 1.2
TLS_RSA_WITH_AES_256_GCM_SHA384 No FS
Baidu Jan 2015 RSA 2048 (SHA256) TLS 1.0
TLS_DHE_RSA_WITH_AES_256_CBC_SHA DH 1024 FS
BingPreview Jan 2015 RSA 2048 (SHA256) TLS 1.2
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DH 1024 FS
Chrome 49 / XP SP3 RSA 2048 (SHA256) TLS 1.2
TLS_RSA_WITH_AES_128_GCM_SHA256 No FS
Chrome 57 / Win 7 R RSA 2048 (SHA256) TLS 1.2
TLS_RSA_WITH_AES_256_GCM_SHA384 No FS
Firefox 31.3.0 ESR / Win 7 RSA 2048 (SHA256) TLS 1.2
TLS_DHE_RSA_WITH_AES_256_CBC_SHA DH 1024 FS
Firefox 47 / Win 7 R RSA 2048 (SHA256) TLS 1.2
TLS_DHE_RSA_WITH_AES_256_CBC_SHA DH 1024 FS
Firefox 49 / XP SP3 RSA 2048 (SHA256) TLS 1.2
TLS_DHE_RSA_WITH_AES_256_CBC_SHA DH 1024 FS
Firefox 53 / Win 7 R RSA 2048 (SHA256) TLS 1.2
TLS_DHE_RSA_WITH_AES_256_CBC_SHA DH 1024 FS
Googlebot Feb 2015 RSA 2048 (SHA256) TLS 1.2
TLS_DHE_RSA_WITH_AES_256_CBC_SHA DH 1024 FS
IE 7 / Vista RSA 2048 (SHA256) TLS 1.0
TLS_RSA_WITH_AES_256_CBC_SHA No FS
IE 8 / XP No FS 1 No SNI 2 RSA 2048 (SHA256) TLS
1.0 TLS_RSA_WITH_3DES_EDE_CBC_SHA
IE 8-10 / Win 7 R RSA 2048 (SHA256) TLS 1.0
TLS_RSA_WITH_AES_256_CBC_SHA No FS
IE 11 / Win 7 R RSA 2048 (SHA256) TLS 1.2
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DH 1024 FS
IE 11 / Win 8.1 R RSA 2048 (SHA256) TLS 1.2
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DH 1024 FS
IE 10 / Win Phone 8.0 RSA 2048 (SHA256) TLS 1.0
TLS_RSA_WITH_AES_256_CBC_SHA No FS
IE 11 / Win Phone 8.1 R RSA 2048 (SHA256) TLS 1.2
TLS_RSA_WITH_AES_256_CBC_SHA256 No FS
IE 11 / Win Phone 8.1 Update R RSA 2048 (SHA256) TLS 1.2
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DH 1024 FS
IE 11 / Win 10 R RSA 2048 (SHA256) TLS 1.2
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DH 1024 FS
Edge 13 / Win 10 R RSA 2048 (SHA256) TLS 1.2
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DH 1024 FS
Edge 13 / Win Phone 10 R RSA 2048 (SHA256) TLS 1.2
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DH 1024 FS
Java 6u45 No SNI 2 RSA 2048 (SHA256) TLS 1.0
TLS_DHE_RSA_WITH_AES_128_CBC_SHA DH 1024 FS
Java 7u25 RSA 2048 (SHA256) TLS 1.0
TLS_DHE_RSA_WITH_AES_128_CBC_SHA DH 1024 FS
Java 8u31 RSA 2048 (SHA256) TLS 1.2
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 DH 1024 FS
OpenSSL 0.9.8y RSA 2048 (SHA256) TLS 1.0
TLS_DHE_RSA_WITH_AES_256_CBC_SHA DH 1024 FS
OpenSSL 1.0.1l R RSA 2048 (SHA256) TLS 1.2
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DH 1024 FS
OpenSSL 1.0.2e R RSA 2048 (SHA256) TLS 1.2
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DH 1024 FS
Safari 5.1.9 / OS X 10.6.8 RSA 2048 (SHA256) TLS 1.0
TLS_DHE_RSA_WITH_AES_256_CBC_SHA DH 1024 FS
Safari 6 / iOS 6.0.1 RSA 2048 (SHA256) TLS 1.2
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 DH 1024 FS
Safari 6.0.4 / OS X 10.8.4 R RSA 2048 (SHA256) TLS 1.0
TLS_DHE_RSA_WITH_AES_256_CBC_SHA DH 1024 FS
Safari 7 / iOS 7.1 R RSA 2048 (SHA256) TLS 1.2
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 DH 1024 FS
Safari 7 / OS X 10.9 R RSA 2048 (SHA256) TLS 1.2
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 DH 1024 FS
Safari 8 / iOS 8.4 R RSA 2048 (SHA256) TLS 1.2
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 DH 1024 FS
Safari 8 / OS X 10.10 R RSA 2048 (SHA256) TLS 1.2
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 DH 1024 FS
Safari 9 / iOS 9 R RSA 2048 (SHA256) TLS 1.2
TLS_RSA_WITH_AES_256_GCM_SHA384 No FS
Safari 9 / OS X 10.11 R RSA 2048 (SHA256) TLS 1.2
TLS_RSA_WITH_AES_256_GCM_SHA384 No FS
Safari 10 / iOS 10 R RSA 2048 (SHA256) TLS 1.2
TLS_RSA_WITH_AES_256_GCM_SHA384 No FS
Safari 10 / OS X 10.12 R RSA 2048 (SHA256) TLS 1.2
TLS_RSA_WITH_AES_256_GCM_SHA384 No FS
Apple ATS 9 / iOS 9 R RSA 2048 (SHA256) TLS 1.2
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDH secp256r1 FS
Yahoo Slurp Jan 2015 RSA 2048 (SHA256) TLS 1.2
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DH 1024 FS
YandexBot Jan 2015 RSA 2048 (SHA256) TLS 1.2
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DH 1024 FS
And I was wondering if there is an option to distinguish between these
requests and to maybe enhance SSL-BUMP with some kind of "option" based on
this.
Other options I have seen that helps to distinguish a mobile client compared
to a non-mobile one is by the domain name in the SNI and also by the default
response to a client request simulation.
Any ideas?
Eliezer
----
Eliezer Croitoru
Linux System Administrator
Mobile: +972-5-28704261
Email: eliezer at ngtech.co.il
More information about the squid-dev
mailing list